StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Home Network Security - Essay Example

Cite this document
Summary
As the author of the paper "Home Network Security' outlines, internet connectivity involves operational risks. It is necessary to check unauthorized use of computers, both personal and in professional organizations. Breaks into the systems have become common…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
Home Network Security
Read Text Preview

Extract of sample "Home Network Security"

? Computer sciences and Information Technology, Essay Topic: Summary Home Network Security Internetconnectivity involves operational risks. It is necessary to check unauthorized use of computers, both personal and those in professional organizations. Breaks into the systems have become common. In banking institutions and investment companies the secrecy of information is all the more important and if the issue is neglected it results in loss of funds, at times in colossal proportions. No one would like someone else peeping into one’s personal communications. Intruders try to gain control on the computer systems to access confidential information. Someone may place harmful programs in one’s computer. To challenge these eventualities, understanding technologies that govern the internet and introducing them into the system without delay is the answer. Some of the networking systems are Broadband, Cable Modem Access with “shared medium” topology and DSL Access. From the point of view of technology, broadband services are different from traditional dial-up services. In the latter case, computer connects to the Internet when it has something specific act to perform. As soon as the action is over, after the specified idle time, the computer will disconnect the call. A different IP address is assigned on each call, since the Internet connection is part of the pool system of the modems. An intruder finds it tough to break-in, into the data in this system. Since Broadband is “always-on” service, the intruder has the fixed target to attack. Large networks like corporate and government have protection systems by many layers of security, in the form of firewalls to encryption. The same may not be possible for an individual user of internet. Your ISP takes care about maintaining the services offered to you. The ultimate responsibility for operating the home network is with the concerned individual. Many protection systems are in use for safeguarding the operations and communications of the computers. Protocol, Internet Protocol, IP Addresses, static vs. dynamic addressing, NAT, TCP and UDP Ports, Software firewall - specialized software running on an individual computer, or Network firewall - a dedicated device designed to protect one or more computers. Antivirus software system is one of the important agents that guard one’s computer against viruses. They indicate the possible presence of viruses. New viruses are discovered daily and there is no fool-proof method to stop them altogether. Profiles needs to be kept up-to-date, and appropriate solutions must be found to tackle the new viruses. The important information security areas are confidentiality, integrity and availability. These fundamental rules are applicable to individual users of networking system, as well as to the corporate and government networks. The user must be constantly on the lookout for new threats, and keep one’s knowledge up-to-date with the help of new technologies that are introduced for the protection of the networking community. Eternal vigilance and taking simple protective steps are assurances that the system will not be affected by the common threats. The risks in the networking field are both accidental and intentional. Intentional risks are the handiworks of the intruders, and this has to be challenged immediately, as no network user likes to reveal one’s information to others. Curtailing Information Security Vulnerabilities through Situational Crime Prevention Internet revolution has engulfed and impacted majority of the segments of life of humankind. Information has taken over the center-stage of business activities, whether it is administration, production or marketing. Consequently, an unfortunate aspect of this positive development is the rapid increase in cyber-crimes. To counter this, many security systems meant to protect computer applications are on the anvil. The business houses and government departments have resolutely reacted to the exploitation of information security vulnerabilities. New software and hardware applications are constantly being invented to secure the confidentiality and integrity of the data. But what is important is the application of the security measures in practical situations. In the above mentioned article in Security Journal Sameer Hinduja and Brandon Koohi argue that “these tactics have achieved limited success due to inattention to the opportunistic aspects of crime commission.” (Curtailing….)When crimes happen, the first poser needs to be about prevention of its manifestation by modification of the setting, conditions and contexts. Howsoever perfect may be the security system, unless the implementing staff puts it through with dedication, the system cannot be blamed for not providing the desired objectives. Crime prevention therefore, depends on the system and the men handling the implementation of the system. Internet crimes are committed by smart and intelligent people and those who are in charge of detecting it need to be extra-smart. To create an infrastructure and defend it well, are the essential requirement for the viability and success of an organization. Corporate security solutions are on the top of the agenda in such organizations. Internet revolution and technological advancement have engulfed the world with unprecedented quantum of information in all segments of life. All types of cybercrimes are on the increase rapidly. With constant erosion in the ethical standards in business, risks have attained new dimensions. The threat is not only from a competitive organization, but such negativities can be executed from insiders also, for monetary considerations. But organizations are hesitant to approach the policing and regulatory authorities for remedies for certain practical reasons. A reputed organization fears adverse publicity. Nevertheless, a line of communication and sharing of experiences between business organizations, the law-enforcing authorities, criminologists and the social scientists, would enrich the mutual expertise in understanding the modus operandi adopted in cybercrimes and would help in detecting such crimes in future. The association of university experts in the crime prevention efforts is a welcome step as it would help to transmit the knowledge gained back to universities. But those who commit cyber-crimes are always one step ahead and succeed in breaching the existing security systems. Corporations are seized of this issue and they constantly update their internal security measures to challenge these vulnerabilities by implementing technological measures like authentication, intrusion detection, access control systems and encryption. Such measures at own levels in the departments of hardware and software are necessary to protect the confidentiality and integrity of the data. But the issues are serious at the individual level with decentralization of control and access to smaller computer systems. Enough tools and resources are available to wrongdoers to engage in cyber-crimes. Union of computers and communications has advantages but serious disadvantages as well as they encourage wrongdoings. A comprehensive plan to address such crimes is absolutely essential. References 1. Hinduja, Sameer (Author), Koohi Brandon (Author). Curtailing Information Security Vulnerabilities through Situational Crime Prevention; Security Journal (Special Issue) 2. Home Network Security Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Summary Essay Example | Topics and Well Written Essays - 1000 words - 3”, n.d.)
Retrieved from https://studentshare.org/information-technology/1467710-summary
(Summary Essay Example | Topics and Well Written Essays - 1000 Words - 3)
https://studentshare.org/information-technology/1467710-summary.
“Summary Essay Example | Topics and Well Written Essays - 1000 Words - 3”, n.d. https://studentshare.org/information-technology/1467710-summary.
  • Cited: 0 times

CHECK THESE SAMPLES OF Home Network Security

Network Security

network security is complicated but is equally important because it secures the assets of a company and allows it to keep its secretive strategic plans so as to gain competitive advantage.... In the contemporary age network security has become vital for preserving their relationships.... hellip; This paper discusses some of the potential threats to network security and the ways to mitigate them.... The paper also renders useful information about network security policing....
9 Pages (2250 words) Research Paper

Network Security

hellip; The rapid growth of networking has also come with its own challenges, mainly in the area of network security.... Therefore, network security can be defined as the safety of interlinked systems.... The rapid growth of networking has also come with its own challenges, mainly in the area of network security.... Therefore, network security can be defined as the safety of interlinked systems.... However, since the mid 1980s, networked computer workstations became common and with this came the issue of information and network security....
7 Pages (1750 words) Term Paper

Network Security

The author gives a large overview of Jackson, Chris "network security auditing", Harrington Jan "network security: A Practical approach", Douglas Comer “Computer Networks and Internets” and other works on the topic of network security.... hellip; Current annotated bibliography includes Winkler Vic "Securing the Cloud: Cloud Computer Security Techniques and Tactics", Chey Cobb "network security for dummies", Cole Eric "Networking security bible", Donahue Gary Network Warrior" and other books on the stated topic....
18 Pages (4500 words) Annotated Bibliography

Network Security and Different Ways to Secure Networks

This research will begin with the statement that network security can be defined as the protocols and security measures were taken in order to secure and protect the data in the existing network so that unauthorized access to the data can be prevented.... hellip; In order to understand the concept of network security, the core issues related to it needs to be analyzed.... The Need for network security In practice, network security is an important part of many networks at homes, at public places, at colleges and universities and at various offices such as banks, stock exchanges, all kinds of multinational firms and other businesses, law enforcement agencies and even the Government offices and departments where important information is stored....
9 Pages (2250 words) Essay

Network Security & Applications

hellip; Additionally, at present a lot of people get chances to work from home and connect to systems distantly, in this regard network security becomes a significant subject for the companies.... Additionally, at present a lot of people get chances to work from home and connect to systems distantly, in this regard network security becomes a significant subject for the companies.... Thus, this is very important to train the basic computer users and information systems manager in mind, teaching the ideas required to read through the hype in the marketplace and recognize threats associated with the computer security and how to cope with them (network security, 2010; Curtin, 1997)....
1 Pages (250 words) Research Proposal

Introduction to Network Security

RUNNING HEAD: network security network security Threats and Vulnerabilities of a network Type your name here 2/28/2011 Contents RUNNING HEAD: network security 1 Threats and Vulnerabilities of a network 1 Type your name here 1 2/28/2011 1 Contents 2 Abstract 4 Problem Statement 4 Research and Analysis 5 Introduction to network security 5 Why network security?... hellip; 5 Threats and Vulnerabilities to a network 6 Threats to a network 6 Types of Vulnerabilities 9 network security Policy 10 Firewall 11 Internet Protocol Security 11 References 13 Abstract Networks from the time of their birth have come a long way....
9 Pages (2250 words) Research Paper

Wireless Network Security

This paper "Wireless network security" has presented an overview of various security aspects of wireless networks.... These days wireless networking has become an attractive trend and the professionals in all over the world are adopting wireless network security with advance trends and new features in order to protect their networks from various security threats.... Thus, the wireless network security is a major issue that is to be considered while establishing wireless networks (Weber and Bahadur; Makker)....
8 Pages (2000 words) Research Paper

Excessive Filtering of the Internet in Schools

The paper "Excessive Filtering of the Internet in Schools" tells us about wireless security issues for a library.... In this paper, we will discuss the security issues for modern libraries and the ways unauthorized people can steal library information.... 1b standard has been so widely adopted, the security weaknesses in the standard have been exposed.... hellip; People access the e-books or scanned books through the library network and they can simply share what they access with others for example through laptops and PDA's....
9 Pages (2250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us